From a49dee3f75d6e2548e9114d9495655dd56f06973 Mon Sep 17 00:00:00 2001
From: neil_a_wilson <neil_a_wilson@localhost>
Date: Thu, 01 Mar 2007 05:18:42 +0000
Subject: [PATCH] Remove blank lines at the beginning of methods left after eliminating the debugEnter and debugConstructor calls.
---
opends/src/server/org/opends/server/extensions/SaltedSHA256PasswordStorageScheme.java | 16 ----------------
1 files changed, 0 insertions(+), 16 deletions(-)
diff --git a/opends/src/server/org/opends/server/extensions/SaltedSHA256PasswordStorageScheme.java b/opends/src/server/org/opends/server/extensions/SaltedSHA256PasswordStorageScheme.java
index 3a04313..506f80b 100644
--- a/opends/src/server/org/opends/server/extensions/SaltedSHA256PasswordStorageScheme.java
+++ b/opends/src/server/org/opends/server/extensions/SaltedSHA256PasswordStorageScheme.java
@@ -119,7 +119,6 @@
public void initializePasswordStorageScheme(ConfigEntry configEntry)
throws ConfigException, InitializationException
{
-
try
{
messageDigest =
@@ -151,7 +150,6 @@
@Override()
public String getStorageSchemeName()
{
-
return STORAGE_SCHEME_NAME_SALTED_SHA_256;
}
@@ -164,7 +162,6 @@
public ByteString encodePassword(ByteString plaintext)
throws DirectoryException
{
-
byte[] plainBytes = plaintext.value();
byte[] saltBytes = new byte[NUM_SALT_BYTES];
byte[] plainPlusSalt = new byte[plainBytes.length + NUM_SALT_BYTES];
@@ -223,7 +220,6 @@
public ByteString encodePasswordWithScheme(ByteString plaintext)
throws DirectoryException
{
-
StringBuilder buffer = new StringBuilder();
buffer.append('{');
buffer.append(STORAGE_SCHEME_NAME_SALTED_SHA_256);
@@ -288,8 +284,6 @@
public boolean passwordMatches(ByteString plaintextPassword,
ByteString storedPassword)
{
-
-
// Base64-decode the stored value and take the last 8 bytes as the salt.
byte[] saltBytes = new byte[NUM_SALT_BYTES];
byte[] digestBytes;
@@ -359,7 +353,6 @@
@Override()
public boolean supportsAuthPasswordSyntax()
{
-
// This storage scheme does support the authentication password syntax.
return true;
}
@@ -372,7 +365,6 @@
@Override()
public String getAuthPasswordSchemeName()
{
-
return AUTH_PASSWORD_SCHEME_NAME_SALTED_SHA_256;
}
@@ -385,8 +377,6 @@
public ByteString encodeAuthPassword(ByteString plaintext)
throws DirectoryException
{
-
-
byte[] plainBytes = plaintext.value();
byte[] saltBytes = new byte[NUM_SALT_BYTES];
byte[] plainPlusSalt = new byte[plainBytes.length + NUM_SALT_BYTES];
@@ -447,8 +437,6 @@
public boolean authPasswordMatches(ByteString plaintextPassword,
String authInfo, String authValue)
{
-
-
byte[] saltBytes;
byte[] digestBytes;
try
@@ -494,7 +482,6 @@
@Override()
public boolean isReversible()
{
-
return false;
}
@@ -507,7 +494,6 @@
public ByteString getPlaintextValue(ByteString storedPassword)
throws DirectoryException
{
-
int msgID = MSGID_PWSCHEME_NOT_REVERSIBLE;
String message = getMessage(msgID, STORAGE_SCHEME_NAME_SALTED_SHA_256);
throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message,
@@ -524,7 +510,6 @@
String authValue)
throws DirectoryException
{
-
int msgID = MSGID_PWSCHEME_NOT_REVERSIBLE;
String message = getMessage(msgID,
AUTH_PASSWORD_SCHEME_NAME_SALTED_SHA_256);
@@ -540,7 +525,6 @@
@Override()
public boolean isStorageSchemeSecure()
{
-
// SHA-2 should be considered secure.
return true;
}
--
Gitblit v1.10.0